Job Search and Career Advice Platform

Enable job alerts via email!

24/7 SOC Analyst

IP PEOPLE LTD

Remote

GBP 45,000 - 55,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading cybersecurity firm is seeking a remote 24/7 SOC Analyst based in the UK. In this role, you'll be actively involved in managing live incidents and utilizing industry-leading tools. Candidates need at least 1 year of SOC experience or 3 years in infrastructure/network security. This position offers clear paths for career advancement into Senior SOC, Threat Intel, and more. Offering a competitive salary and a collaborative SOC culture, this job is ideal for those passionate about cyber defence.

Benefits

Competitive salary
Structured training
Career progression opportunities

Qualifications

  • 1+ year of SOC experience or 3+ years in infra/networking with security exposure.
  • Strong understanding of alert analysis and attack chains.
  • Familiarity with Windows, Linux, and macOS.

Responsibilities

  • Monitor and investigate alerts across SIEM/EDR/XDR.
  • Analyse attacker behaviour and build incident timelines.
  • Contribute to threat hunting and SOC evolution.

Skills

SOC experience
Log analysis
Endpoint/network fundamentals
Analytical mindset
Curiosity in cyber defence

Tools

Microsoft Sentinel
Google SecOps
Defender XDR
CrowdStrike
SentinelOne
Job description
REMOTE 24/7 SOC Analyst | UK-Based

Frontline cyber defence. Real incidents. Real progression.

Looking to build (or accelerate) your SOC career without commuting?

This is a fully remote 24/7 SOC Analyst role within a modern, analyst-led Security Operations Centre supporting diverse customer environments across the UK & Europe. You’ll be hands‑on with live incidents, real attackers, and industry-leading tools — not just alert watching.

What you’ll be doing
  • Monitoring, triaging & investigating alerts across SIEM / EDR / XDR
  • Analysing attacker behaviour & building incident timelines
  • Escalating incidents with clear technical context
  • Using tools such as Microsoft Sentinel, Google SecOps, Defender XDR, CrowdStrike, SentinelOne
  • Contributing to threat hunting, detection improvements & SOC evolution
What we’re looking for
  • ✔️ 1+ year SOC experience or 3+ years infra/networking with security exposure
  • ✔️ Experience investigating alerts & understanding attack chains
  • ✔️ Strong log analysis & endpoint/network fundamentals
  • ✔️ Familiarity with Windows, Linux & macOS
  • ✔️ Curious, analytical mindset with a genuine interest in cyber defence
  • (Sentinel / CrowdStrike / MITRE ATT&CK / KQL experience is a bonus, not essential)
Shift pattern
  • 12-hour shifts: 2 days / 2 nights / 4 off
  • Flexibility required during major incidents
🔐 Clearance
  • SC clearance eligibility required (DV advantageous)
Why join?
  • Fully remote role (UK-based)
  • Clear progression into Senior SOC, Threat Intel, SOC Engineering & IR
  • Structured training, cyber ranges & real investigation exposure
  • Collaborative, technical SOC culture
  • Competitive salary + strong benefits
Interested?

Apply now or message me for a confidential chat.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.